Information Security: Protection of data from unauthorized access or damages.
Information Systems Security: Focus on protecting systems that process data.
CIA Triad:
Confidentiality: Ensuring data is accessed only by authorized entities.
Integrity: Guaranteeing data remains accurate and unmodified.
Availability: Ensuring data and resources are accessible when needed.
Non-Repudiation: Assurance that an action cannot be denied by the participants.
Technical: Use of technology to manage risks.
Managerial: Policies and processes governing security practices.
Operational: Everyday practices intended to protect data.
Physical: Physical measures like locks and surveillance.
Preventative: Thwart potential threats.
Detective: Identify incidents as they occur.
Corrective: Manage damage and restore systems.
Directive: Guide behavior and enforce compliance.
Trust no one by default; verification is mandatory for every access attempt.
Control Plane: Manage access policies based on user behavior and device risk.
Data Plane: Ensure policy enforcement through established security checks.
Threat: Potential cause for harm to IT systems.
Vulnerability: Weakness in the system that may be exploited.
Risk is managed through both preventative and mitigative strategies.
Encryption: Encodes data to prevent unauthorized access.
Access Controls: Defines permissions for user data access.
Data Masking: Hides specific data to protect sensitive information.
Availability: Maintained through redundancy (server and data backups).
Integrity: Ensured by hashing and verification checks.
Non-repudiation: Supported by digital signatures.
Preparation: Equip teams with detection tools and procedures.
Detection: Quick recognition of potential security issues.
Containment & Eradication: Classifying incidents based on damage potential and swiftly addressing them.
Lessons Learned: Continuously updating the response strategy based on past incidents.
Identification: Scan for and list vulnerabilities.
Assessment: Evaluate based on risk impact.
Measures: Mitigation strategies applied as necessary.
Include comprehensive internal and external controls, focusing on compliance with security protocols such as HIPAA and PCI DSS.
Security awareness training should cover common threats, like phishing and social engineering.
Encourage reporting on suspicious behavior and creating a culture that prioritizes data security.
Resources should be made available to assist employees in recognizing threats.
Ensure secure coding practices.
Code reviews and updates for vulnerabilities.
Employ containerization to improve resilience against attacks.
Necessary to keep software updated and secure against known vulnerabilities.
Evaluate the effectiveness of toolings and processes regularly to ensure compliance with the latest security standards.
By following these study notes, candidates can improve their understanding and potentially their performance in the CompTIA Security+ (SY0-701) exam.